You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa MuPDF

Sigurnosni nedostaci programskog paketa MuPDF

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201702-12
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: MuPDF: Multiple vulnerabilities
Date: February 19, 2017
Bugs: #589826, #590480, #608702, #608712
ID: 201702-12

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in MuPDF, the worst of which
allows remote attackers to execute arbitrary code.

Background
==========

A lightweight PDF, XPS, and E-book viewer.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 app-text/mupdf < 1.10a-r1 >= 1.10a-r1

Description
===========

Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could entice a user to open a specially crafted PDF
document using MuPDF possibly resulting in the execution of arbitrary
code, with the privileges of the process, or a Denial of Service
condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All MuPDF users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=app-text/mupdf-1.10a-r1”

References
==========

[ 1 ] CVE-2016-6265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265
[ 2 ] CVE-2016-6525
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525
[ 3 ] CVE-2017-5896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201702-12

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2.0
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=eHaj
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1_7_0-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-1_7_0-openjdk za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju pribavljanje podataka u...

Close